lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040319073709.36188.qmail@web12826.mail.yahoo.com>
From: onestepto at yahoo.com.au (Paul)
Subject: Malware added in transit


[Hmmmm.  Interesting concept, but unlikely.  
(Maybe if you were clearer about the 
definition of a node?)  I can't recall anything 
that actually did this.  Happy99 and 
PrettyPark did something similar, but really just 
creating a followup to the original 
(innocent) message.  It's unlikely you'd find 
something that would/could infect a 
router to perform this kind of action.  Not 
impossible, but unlikely.]

By node I am thinking moe of any server the file may travel through rather than a router.  And my theoretical question is more concerned with downloaded files (such as media files) than email.
 
Thus, if a web site provides a clean media file for download, can it become tainted by travelling through a compromised server?



one step at a time...




---------------------------------
Find local movie times and trailers on Yahoo! Movies.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040319/3c550eee/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ